Blog
Google and Yahoo Take Stance on Email Authentication
Mon, 12/18/2023
Google and Yahoo announced new email authentication requirements for those sending email to their users, with a rapid deadline of February 2024. Discover what these requirements mean for your organization, the importance of having Domain-based Message Authentication, Reporting & Conformance (DMARC) in place, and how Fortra can help.
...
Blog
Patch Tuesday Update December 2023
By Tyler Reguly on Thu, 12/14/2023
It would seem that Microsoft was feeling particularly festive and wanted to give admins around the world a bit of a break this holiday season. This month, we see 36 Microsoft CVEs and six non-Microsoft CVEs for a total of 42 CVEs and eight of those CVEs are Edge (Chromium-based) vulnerabilities that were announced last week.
Blog
How to Recover After Failing a Cybersecurity Audit
Tue, 12/12/2023
While it’s important to adhere to compliance regulations, blunders do happen. What does it mean when these blunders lead to you failing a cybersecurity audit, and how can you recover?
Consequences of Failing a Cybersecurity Audit
Failing a cybersecurity audit can mean several things.
First, there’s the up-front legal fines that come with falling on the wrong side of compliance. Here are a few...
Blog
A Career Dedicated to Customer Support: Steve Warner
Wed, 12/06/2023
Steve Warner has enjoyed working closely with Fortra customers since 2007. Learn more about this senior support consultant, his memorable trip to Singapore, and the helpful advice he got early in his career.
Blog
How to Scrape Data from a Website (Tutorial)
Thu, 11/30/2023
Spending too much time going to websites and manually entering data into spreadsheets? While they may seem simple, these types of tasks eat up a great deal of time, and with manual data entry, are incredibly error prone. But with a web scraping tool, you can scrape data from a website, saving your team time and reducing errors. And with the right tool, you won’t need to write a single line of code...
Blog
RPA vs. API: Differences and Use Cases
Thu, 11/30/2023
At its very core, the goal of automation is to take routine, repetitive tasks off the hands of time-strapped employees. Robotic process automation (RPA) solutions are designed to do this, but some lack an important feature that can make simplifying your tasks much harder than it needs to be—API connectivity. In this blog, we’re going to take you through the definition of both RPA and APIs, share...
Blog
The Changing Role of Government in Cybersecurity
By Antonio Sanchez on Wed, 11/29/2023
Governments are responsible for carrying out their duties to defend the rights and safety of their citizens. Find out their role in the cyber landscape and how Fortra plays a part.
Blog
Common Email Threats and How to Combat Them
By Antonio Sanchez on Wed, 11/29/2023
We let email threats slip by us every day. Discover what popular ploys your team might be missing and how Fortra’s advanced security solutions can help.
Blog
6 Key MDR Vendor Selection Criteria
Wed, 11/29/2023
Discover six criteria you can use as you assess MDR vendors along with an evaluation template to easily evaluate MDR vendors by each criterion.
Blog
How Retailers Can Stay Cybersecurity Savvy During Peak Season
By John Wilson on Wed, 11/22/2023
Retailers historically hurt during the fall and winter because attackers go where the money goes, and things like Black Friday, Cyber Monday, and the festive season all funnel expenses their way.
Blog
What’s New on Release Day 2023.4
Mon, 11/20/2023
In this issue discover how Fortra has strengthened email security and phishing protection with new rules and automation. Additionally, offensive security has added new capabilities, while data security has improved incident workflows for better threat remediation.
Blog
Government Supply Chain Cybersecurity in 2024
By Antonio Sanchez on Fri, 11/17/2023
Government agencies are a huge target for attackers, and with a hyper-distrubuted supply chain, they are easier to access than ever. Discover what it takes to keep your public sector supply chain safe and how Fortra can help.
Blog
Patch Tuesday Update November 2023
By Tyler Reguly on Fri, 11/17/2023
This month brings us 63 Microsoft CVEs and 15 non-Microsoft CVEs, with Microsoft continuing the recent trend of splitting out CVEs. To understand this a bit more, we need to talk about CVE Numbering Authorities or CNAs.
Blog
What is Hyperautomation?
Wed, 11/08/2023
For many organizations, what were once islands of automation are converging. And they’re realizing there’s even more labor in their organizations that can be automated. But to bring it all together, they need a craftier strategy to make it happen.
Enter hyperautomation. What started as the latest industry buzzword, has become a critical discipline to add to your digital transformation strategy. ...
Blog
What Is Cybersecurity Maturity?
By Antonio Sanchez on Mon, 11/06/2023
A mature cybersecurity program is essential for the ultimate survival of any organization facing today’s challenging threat climate. Learn the essentials of cybersecurity maturity and prepare your organization to get to the next level.
Blog
A Dozen Things You Should Know About Automated Job Scheduling
By Tom Huntington on Wed, 11/01/2023
Automated job scheduled software can give your company the competitive edge. Use these twelve tips to get started or to take your schedule to a new level.
Blog
Fortra’s Scott Cole: Strategic Expansion
Mon, 10/30/2023
With nearly a decade at Fortra, Scott Cole provides seasoned insights into Fortra’s robust acquisition strategy and creating something greater than the sum of its parts.
Blog
What’s It Like to Be in Product Strategy at Fortra?
Fri, 10/27/2023
The Fortra Product Strategy team delivers ongoing value to global customers through our best-in-class solutions and services. Learn how these visionaries collaborate with customers and others at Fortra to define how feature sets should evolve.
Blog
Threat Actor Profile: Strox Phishing-as-a-Service
Fri, 10/20/2023
Strox phishing-as-a-service has become one of the most complete phishing solutions for fraud actors available, offering advanced phishing kits, hosting services, mail spam scripts, and an automated market for selling stolen credentials. Uncover the origins, evolution, and impact of Strox, a prominent player in the world of online fraud.